lanmaster53 / honeybadgerLinks
☆234Updated 5 years ago
Alternatives and similar repositories for honeybadger
Users that are interested in honeybadger are comparing it to the libraries listed below
Sorting:
- ☆201Updated 3 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170Updated 7 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆223Updated 5 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆254Updated 2 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Monitor geotagged social media from multiple platforms in real time.☆77Updated 6 years ago
- Python3 library and command line for GreyNoise☆153Updated 2 months ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆141Updated 6 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆94Updated 4 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- Pastebin OSINT Harvester☆325Updated 6 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- ☆208Updated 7 years ago
- Gather Open-Source Intelligence using PowerShell.☆175Updated 5 years ago
- ☆237Updated 5 years ago
- Professionally Evil Web Application Penetration Testing 101☆145Updated 5 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆559Updated 3 months ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 6 months ago
- ☆73Updated 7 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆178Updated last year
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆61Updated 4 years ago
- ☆54Updated 5 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Updated last year
- AI-based, context-driven network device ranking☆300Updated last year
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆482Updated 5 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago